Follow
ida tucker
Title
Cited by
Cited by
Year
Two-party ECDSA from hash proof systems and efficient instantiations
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
872019
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
862020
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2018
602018
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Theoretical Computer Science 939, 78-104, 2023
192023
Additive-homomorphic functional commitments and applications to homomorphic signatures
D Catalano, D Fiore, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
142022
Threshold Linearly Homomorphic Encryption on 
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
122022
Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups
I Tucker
Université de Lyon, 2020
52020
Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams
D Fiore, I Tucker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
32022
Ring signatures with user-controlled linkability
D Fiore, L Garms, D Kolonelos, C Soriente, I Tucker
European Symposium on Research in Computer Security, 405-426, 2022
32022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency
G Castagnos, F Laguillaumie, I Tucker
Theoretical Computer Science 914, 84-113, 2022
12022
Hardware security without secure hardware: How to decrypt with a password and a server
O Blazy, L Brouilhet, C Chevalier, P Towa, I Tucker, D Vergnaud
Theoretical Computer Science 895, 178-211, 2021
12021
Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe| Theses. fr
I Tucker
Lyon, 2020
12020
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
L Braun, G Castagnos, I Damgård, F Laguillaumie, K Melissaris, C Orlandi, ...
Cryptology ePrint Archive, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–13